Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supplemental Cryptographic Hardware for Smart Cards., , , and . IEEE Micro, 21 (6): 26-35 (2001)3D Visual Tool supporting Derivation of Distributed-Memory Massively Parallel Programs by Stepwise Transformations.. PARCO, page 625-632. (1997)An Application of Equational Programming with Streams to the Development of Efficient Programs for MIMD Computers.. PARCO, page 659-664. Elsevier, (1993)RSA Acceleration with Field Programmable Gate Arrays., and . ACISP, volume 1587 of Lecture Notes in Computer Science, page 164-176. Springer, (1999)Estimating the number of clusters in a numerical data set via quantization error modeling., , and . Pattern Recognit., 48 (3): 941-952 (2015)Hardware Security Features for Secure Embedded Devices., and . ISSE, page 38-44. Vieweg, (2006)High Density Smart Cards: New Security Challenges and Applications., and . ISSE, page 251-259. Vieweg+Teubner, (2007)Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI., , and . TRUST, volume 4968 of Lecture Notes in Computer Science, page 107-118. Springer, (2008)Visualization of Configuration Description in Parallel Programming Environment., and . HPCN Europe, volume 1067 of Lecture Notes in Computer Science, page 1023-1024. Springer, (1996)Determining the Number of Clusters with Rate-Distortion Curve Modeling., and . ICIAR (1), volume 7324 of Lecture Notes in Computer Science, page 43-50. Springer, (2012)